Vectorized linear approximations for attacks
- n SNOW 3G
Jing Yang1 Thomas Johansson1 Alexander Maximov2
- 1Dept. of Electrical and Information Technology, Lund University
2Ericsson Research, Lund, Sweden FSE ’2020 November, 2020
Vectorized linear approximations for attacks on SNOW 3G Jing Yang 1 - - PowerPoint PPT Presentation
Vectorized linear approximations for attacks on SNOW 3G Jing Yang 1 Thomas Johansson 1 Alexander Maximov 2 1 Dept. of Electrical and Information Technology, Lund University 2 Ericsson Research, Lund, Sweden FSE 2020 November, 2020 Outline 1
2Ericsson Research, Lund, Sweden FSE ’2020 November, 2020
0 / 19
1 / 19
1 / 19
1 / 19
1 / 19
1 / 19
2 / 19
s0 s2 s5 s11 s15 s1 α α-1
R1 R2 R3 S1 S2
z(t)
FSM LFSR
2 / 19
s0 s2 s5 s11 s15 s1
3 / 19
s0 s2 s5 s11 s15 s1
3 / 19
s0 s2 s5 s11 s15 s1
3 / 19
s0 s2 s5 s11 s15 s1
3 / 19
R1 R2 R3 S1 S2
(t)
(t)
(t) 4 / 19
R1 R2 R3 S1 S2
(t)
(t)
(t)
4 / 19
R1 R2 R3 S1 S2
(t)
(t)
(t)
4 / 19
5 / 19
5 / 19
5 / 19
6 / 19
6 / 19
6 / 19
6 / 19
6 / 19
6 / 19
|D|−1
6 / 19
|D|−1
6 / 19
|D|−1
6 / 19
|D|−1
6 / 19
R1 R2 R3 S1 S2
(t)
(t)
(t) 7 / 19
R1 R2 R3 S1 S2
(t)
(t)
(t)
z
15
5
7 / 19
R1 R2 R3 S1 S2
(t)
(t)
(t)
z
15
5
7 / 19
R · L−1 1 (R2(t))
Q · L−1 2 (R3(t))
5 )
8 / 19
R · L−1 1 (R2(t))
Q · L−1 2 (R3(t))
5 )
R L−1 1 (R2(t)) ⊞ s(t−1) 15
Q L−1 2 (R3(t)) ⊕ s(t−1)
15 ) ⊕ R2(t) ⊕ s(t)
1 z(t+1) = L−1 1 (R2(t) ⊞ (R3(t) ⊕ s(t) 5 ) ⊞ s(t+1) 15
1 s(t+1)
8 / 19
z(t−1) z(t) L−1
1
z(t+1)
[0,0,0]
= (S−1
R (L−1 1
R2(t)) ⊞ s(t−1)
15
) ⊕ s(t−1)
15
⊕ S−1
Q (L−1 2
R3(t)) R2(t) L−1
1
[(R2(t) ⊞ (R3(t) ⊕ s(t)
5
) ⊞ s(t+1)
15
) ⊕ s(t)
5
⊕ s(t+1)
15
]
[0,0,0]
⊕ (R1(t) ⊞ s(t)
15 ) ⊕ s(t) 15
SR(R1(t))
[0,0,0]
⊕ s(t−1) ⊕ s(t−1)
15
s(t)
15 ⊕ s(t)
L−1
1
[s(t+1) ⊕ s(t)
5
⊕ s(t+1)
15
]
[0,0,0]
9 / 19
z(t−1) z(t) L−1
1
z(t+1)
[0,0,0]
= (S−1
R (L−1 1
R2(t)) ⊞ s(t−1)
15
) ⊕ s(t−1)
15
⊕ S−1
Q (L−1 2
R3(t)) R2(t) L−1
1
[(R2(t) ⊞ (R3(t) ⊕ s(t)
5
) ⊞ s(t+1)
15
) ⊕ s(t)
5
⊕ s(t+1)
15
]
[0,0,0]
⊕ (R1(t) ⊞ s(t)
15 ) ⊕ s(t) 15
SR(R1(t))
[0,0,0]
⊕ s(t−1) ⊕ s(t−1)
15
s(t)
15 ⊕ s(t)
L−1
1
[s(t+1) ⊕ s(t)
5
⊕ s(t+1)
15
]
[0,0,0]
9 / 19
z(t−1) z(t) L−1
1
z(t+1)
[0,0,0]
= (S−1
R (L−1 1
R2(t)) ⊞ s(t−1)
15
) ⊕ s(t−1)
15
⊕ S−1
Q (L−1 2
R3(t)) R2(t) L−1
1
[(R2(t) ⊞ (R3(t) ⊕ s(t)
5
) ⊞ s(t+1)
15
) ⊕ s(t)
5
⊕ s(t+1)
15
]
[0,0,0]
⊕ (R1(t) ⊞ s(t)
15 ) ⊕ s(t) 15
SR(R1(t))
[0,0,0]
⊕ s(t−1) ⊕ s(t−1)
15
s(t)
15 ⊕ s(t)
L−1
1
[s(t+1) ⊕ s(t)
5
⊕ s(t+1)
15
]
[0,0,0]
9 / 19
z(t−1) z(t) L−1
1
z(t+1)
[0,0,0]
= (S−1
R (L−1 1
R2(t)) ⊞ s(t−1)
15
) ⊕ s(t−1)
15
⊕ S−1
Q (L−1 2
R3(t)) R2(t) L−1
1
[(R2(t) ⊞ (R3(t) ⊕ s(t)
5
) ⊞ s(t+1)
15
) ⊕ s(t)
5
⊕ s(t+1)
15
]
[0,0,0]
⊕ (R1(t) ⊞ s(t)
15 ) ⊕ s(t) 15
SR(R1(t))
[0,0,0]
⊕ s(t−1) ⊕ s(t−1)
15
s(t)
15 ⊕ s(t)
L−1
1
[s(t+1) ⊕ s(t)
5
⊕ s(t+1)
15
]
[0,0,0]
15 [0] in O(216)
9 / 19
z(t−1) z(t) L−1
1
z(t+1)
[0,0,0]
= (S−1
R (L−1 1
R2(t)) ⊞ s(t−1)
15
) ⊕ s(t−1)
15
⊕ S−1
Q (L−1 2
R3(t)) R2(t) L−1
1
[(R2(t) ⊞ (R3(t) ⊕ s(t)
5
) ⊞ s(t+1)
15
) ⊕ s(t)
5
⊕ s(t+1)
15
]
[0,0,0]
⊕ (R1(t) ⊞ s(t)
15 ) ⊕ s(t) 15
SR(R1(t))
[0,0,0]
⊕ s(t−1) ⊕ s(t−1)
15
s(t)
15 ⊕ s(t)
L−1
1
[s(t+1) ⊕ s(t)
5
⊕ s(t+1)
15
]
[0,0,0]
15 [0] in O(216)
9 / 19
1Zhang B., et al. Fast correlation attacks over extension fields, large-unit...CRYPTO’2015. 2Maximov A, et al. Fast computation of large distributions and... ASIACRYPT 2005. 10 / 19
1, s15 1)
2, s15 2)
3, s15 3)
4, s15 4)
1Zhang B., et al. Fast correlation attacks over extension fields, large-unit...CRYPTO’2015. 2Maximov A, et al. Fast computation of large distributions and... ASIACRYPT 2005. 10 / 19
1, s15 1)
2, s15 2)
3, s15 3)
4, s15 4)
1Zhang B., et al. Fast correlation attacks over extension fields, large-unit...CRYPTO’2015. 2Maximov A, et al. Fast computation of large distributions and... ASIACRYPT 2005. 10 / 19
1, s15 1)
2, s15 2)
3, s15 3)
4, s15 4)
1Zhang B., et al. Fast correlation attacks over extension fields, large-unit...CRYPTO’2015. 2Maximov A, et al. Fast computation of large distributions and... ASIACRYPT 2005. 10 / 19
1, s15 1)
2, s15 2)
3, s15 3)
4, s15 4)
1Zhang B., et al. Fast correlation attacks over extension fields, large-unit...CRYPTO’2015. 2Maximov A, et al. Fast computation of large distributions and... ASIACRYPT 2005. 10 / 19
1, s15 1)
2, s15 2)
3, s15 3)
4, s15 4)
1Zhang B., et al. Fast correlation attacks over extension fields, large-unit...CRYPTO’2015. 2Maximov A, et al. Fast computation of large distributions and... ASIACRYPT 2005. 10 / 19
11 / 19
11 / 19
11 / 19
11 / 19
12 / 19
12 / 19
12 / 19
15
15 ⊕ s(t) 0 )[0]
1 [z(t+1) ⊕ s(t+1)
5
15
12 / 19
15
15 ⊕ s(t) 0 )[0]
1 [z(t+1) ⊕ s(t+1)
5
15
12 / 19
15
15 ⊕ s(t) 0 )[0]
1 [z(t+1) ⊕ s(t+1)
5
15
12 / 19
15
15 ⊕ s(t) 0 )[0]
1 [z(t+1) ⊕ s(t+1)
5
15
12 / 19
38 38.5 39 39.5 40 40.5 41 41.5 42
0.05 0.1 0.15 0.2 0.25 0.3 0.35
TYPE I Errors TYPE II Errors
13 / 19
38 38.5 39 39.5 40 40.5 41 41.5 42
0.05 0.1 0.15 0.2 0.25 0.3 0.35
TYPE I Errors TYPE II Errors
13 / 19
38 38.5 39 39.5 40 40.5 41 41.5 42
0.05 0.1 0.15 0.2 0.25 0.3 0.35
TYPE I Errors TYPE II Errors
13 / 19
38 38.5 39 39.5 40 40.5 41 41.5 42
0.05 0.1 0.15 0.2 0.25 0.3 0.35
TYPE I Errors TYPE II Errors
13 / 19
38 38.5 39 39.5 40 40.5 41 41.5 42
0.05 0.1 0.15 0.2 0.25 0.3 0.35
TYPE I Errors TYPE II Errors
13 / 19
14 / 19
14 / 19
14 / 19
14 / 19
14 / 19
14 / 19
3Löndahl, C., & Johansson, T. Improved algorithms for finding low-weight polynomial multiples in F2[x] and some cryptographic applications.DCC 2014. 15 / 19
3Löndahl, C., & Johansson, T. Improved algorithms for finding low-weight polynomial multiples in F2[x] and some cryptographic applications.DCC 2014. 15 / 19
3Löndahl, C., & Johansson, T. Improved algorithms for finding low-weight polynomial multiples in F2[x] and some cryptographic applications.DCC 2014. 15 / 19
3Löndahl, C., & Johansson, T. Improved algorithms for finding low-weight polynomial multiples in F2[x] and some cryptographic applications.DCC 2014. 15 / 19
3Löndahl, C., & Johansson, T. Improved algorithms for finding low-weight polynomial multiples in F2[x] and some cryptographic applications.DCC 2014. 15 / 19
16 / 19
16 / 19
16 / 19
16 / 19
16 / 19
16 / 19
17 / 19
17 / 19
17 / 19
15
15 ⊕ ΓL−1 1 [s(t+1)
5
15
1 z(t+1))[0]
17 / 19
4Zhang B., et al. Fast correlation attacks over extension fields, large-unit linear approximation and cryptanalysis of SNOW 2.0. CRYPTO’2015. 18 / 19
4Zhang B., et al. Fast correlation attacks over extension fields, large-unit linear approximation and cryptanalysis of SNOW 2.0. CRYPTO’2015. 18 / 19
4Zhang B., et al. Fast correlation attacks over extension fields, large-unit linear approximation and cryptanalysis of SNOW 2.0. CRYPTO’2015. 18 / 19
19 / 19
19 / 19
19 / 19
19 / 19
19 / 19
19 / 19
19 / 19
19 / 19
19 / 19